Google Jamboard

Google (GOOGL, Tech30) unveiled a new 55-inch digital whiteboard on wheels that is intended to “redefine meetings,” or at least help Google gain footing in the workplace.The product, called Jamboard, lets teams pull up documents and presentations on screen from Google’s suite of productivity tools like Docs and Drive. Likewise, whatever you write or draw on the giant touchscreen can then be backed up online.

Source: Google is making a high-tech whiteboard – Oct. 25, 2016

High-end poker cheating devices

This is a crazy story about custom hardware designed to allow for card game cheating, including not only poker but nearly any other card game. Custom hardware made to look like a cell phone plus IR marked cards equals total knowledge about what’s happening on the table.

Upon ordering the poker cheating device I kinda expected, based on the screenshots I had seen early on, to get a dedicated piece of hardware that kinda looked like a fake phone. However, to my surprise, the device, showcased in the picture above, far exceeded my expectations by being a fully functional phone with extra hardware dedicated to cheating. Also to my surprise, the device not only allows to cheat at Poker but to cheat at almost any kind of card games you can think of.

Source: Full(er) House: Exposing high-end poker cheating devices

Source Code for IoT Botnet ‘Mirai’ Released

The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.

Source: Source Code for IoT Botnet ‘Mirai’ Released — Krebs on Security

Zombie Moore’s Law shows hardware is eating software

This is a fantastic article that illustrates one reason I’ve been so fascinated by hardware over the last few years.

The cheap and easy gains of the last fifty years of Moore’s Law gave birth to a global technology industry. The next little while – somewhere between twenty and fifty years out – will be dominated by a transition from software into hardware, a confusion of the two so complete it will literally become impossible to know where the boundary between the two lies.

Source: Zombie Moore’s Law shows hardware is eating software • The Register

Largest DDoS attack ever delivered by botnet of hijacked IoT devices

 

Get used to this, because here’s the future of computer security….

A giant botnet made up of hijacked internet-connected things like cameras, lightbulbs, and thermostats has launched the largest DDoS attack ever against a top security blogger, an attack so big Akamai had to cancel his account because defending it ate up too many resources.

Source: Largest DDoS attack ever delivered by botnet of hijacked IoT devices | Network World

Amazon’s cheaper Echo Dot


If you’ve been looking for a way to test Amazon’s voice assistant/AI/Machine Learning gizmo Alexa, here’s the cheapest way yet to give it a try.

Amazon is unveiling an all-new, second-generation Dot today that’s priced at just $49.99. Just like the previous Dot, you can use the tiny puck-like device to add the Alexa voice assistant to existing speakers. Amazon is releasing the new Echo Dot in both black and white, with a more powerful, completely redesigned voice processor.

Source: Amazon’s cheaper Echo Dot improves voice recognition, available in black and white – The Verge

Hacking medical devices for profit

The hackers would provide data proving the medical devices were life-threatening, with Block taking a short position against St. Jude. The hackers’ fee for the information increases as the price of St. Jude’s shares fall, meaning both Muddy Waters and MedSec stand to profit. If the bet doesn’t work, and the shares don’t fall, MedSec could lose money, taking into account their upfront costs, including research.

Source: Carson Block’s Attack on St. Jude Reveals a New Front in Hacking for Profit – Bloomberg